CN110188731A - A kind of alarm method and relevant apparatus violating the regulations of operation field - Google Patents

A kind of alarm method and relevant apparatus violating the regulations of operation field Download PDF

Info

Publication number
CN110188731A
CN110188731A CN201910491479.6A CN201910491479A CN110188731A CN 110188731 A CN110188731 A CN 110188731A CN 201910491479 A CN201910491479 A CN 201910491479A CN 110188731 A CN110188731 A CN 110188731A
Authority
CN
China
Prior art keywords
data
regulations
violating
visualized
informative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910491479.6A
Other languages
Chinese (zh)
Inventor
邹奇烽
郑桥敏
陈文志
程思娜
陈珍
卢远飞
郑雄风
李富春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Heyuan Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Heyuan Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Heyuan Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN201910491479.6A priority Critical patent/CN110188731A/en
Publication of CN110188731A publication Critical patent/CN110188731A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Emergency Management (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Business, Economics & Management (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Psychiatry (AREA)
  • Social Psychology (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

This application discloses a kind of alarm methods violating the regulations of operation field, comprising: obtains the visualized informative data of operation field;Analysis operation is determined according to the type of the visualized informative data, and the analysis is executed to the visualized informative data and is operated, behavioral data is obtained;Judge whether the behavioral data matches with act of violating regulations data;If so, carrying out alarm operation.By analyzing the visualized informative data got, behavioral data is obtained, then judged accordingly, to carry out alarm operation, reduce monitoring cost, improve the timeliness of monitoring.The application also provides the warning system violating the regulations, operation field alarm device and computer readable storage medium of a kind of operation field, has the above beneficial effect.

Description

A kind of alarm method and relevant apparatus violating the regulations of operation field
Technical field
This application involves Real-time Monitor Technique field, in particular to the alarm method violating the regulations of a kind of operation field, operation are existing Warning system violating the regulations, operation field alarm device and the computer readable storage medium of field.
Background technique
Currently, some for power industry etc. need in the industry that special operation scene is operated, since operation is existing The particularity of field, needs to guarantee the safety in the operating personnel wherein to work.But operating personnel is the case where lacking supervision Under, it is easy to appear situation off one's guard, there are habitual acts of violating regulations, cause personal injury and property loss.Therefore, existing Technology usually increases care provider, and places Visualization Platform for carrying out remote supervisory in operation field, makees to observe Whether industry personnel have operation behaviour violating the regulations, remind operating personnel in time, reduce the security risk of operating personnel.
But currently used method needs to put into a large amount of manpower and material resources, higher cost causes very big resource wave Take, and remote supervisory is carried out by Visualization Platform, the security risk of operating personnel can not be controlled at the first time, reduces to work The effectiveness of industry field surveillance.
Therefore, how the effectiveness to exercise supervision to operation field is improved in the case where reducing supervision cost, be this The Important Problems of field technical staff concern.
Summary of the invention
The purpose of the application be to provide a kind of alarm method violating the regulations of operation field, operation field warning system violating the regulations, Operation field alarm device and computer readable storage medium, by analyzing the visualized informative data got, Behavioral data is obtained, then is judged accordingly, to carry out alarm operation, monitoring cost is reduced, improves the timeliness of monitoring.
In order to solve the above technical problems, the application provides a kind of alarm method violating the regulations of operation field, comprising:
Obtain the visualized informative data of operation field;
Analysis operation is determined according to the type of the visualized informative data, to described in visualized informative data execution Analysis operation, obtains behavioral data;
Judge whether the behavioral data matches with act of violating regulations data;
If so, carrying out alarm operation.
Optionally, analysis operation is determined according to the type of the visualized informative data, to the visualized informative data The analysis operation is executed, behavioral data is obtained, comprising:
When the type of the visualized informative data is video data, it is dynamic that human body is carried out to the visualized informative data It performs an analysis, obtains human action information;
Using the human action information as the behavioral data.
Optionally, judge whether the behavioral data matches with act of violating regulations data, comprising:
Judge the behavioral data human action information whether the human action information phase with the act of violating regulations data Matching.
Optionally, analysis operation is determined according to the type of the visualized informative data, to the visualized informative data The analysis operation is executed, behavioral data is obtained, comprising:
When the type of the visualized informative data be picture data when, to the visualized informative data carry out safety away from From analysis, range data is obtained;
Using the range data as the behavioral data.
Optionally, judge whether the behavioral data matches with act of violating regulations data, comprising:
Judge whether the range data of the behavioral data is greater than the safe distance data of the act of violating regulations data.
Optionally, further includes:
When the behavioral data and the act of violating regulations Data Matching, the behavioral data is saved to act of violating regulations number According to library.
The application also provides a kind of warning system violating the regulations of operation field, comprising:
Visualized informative data obtains module, for obtaining the visualized informative data of operation field;
Visual information analysis module, for determining analysis operation according to the type of the visualized informative data, to institute It states visualized informative data and executes the analysis operation, obtain behavioral data;
Judgment module violating the regulations, for judging whether the behavioral data matches with act of violating regulations data;
Alarm module violating the regulations, for carrying out alarm operation when the behavioral data and the act of violating regulations Data Matching.
Optionally, further includes:
Violation data preserving module is used for when the behavioral data and the act of violating regulations Data Matching, by the row It saves for data to act of violating regulations database.
The application also provides a kind of operation field alarm device, comprising:
Memory, for storing computer program;
Processor realizes the step of breaking rules and regulations alarm method as described above when for executing the computer program.
The application also provides a kind of computer readable storage medium, and calculating is stored on the computer readable storage medium Machine program realizes the step of breaking rules and regulations alarm method as described above when the computer program is executed by processor.
The alarm method violating the regulations of a kind of operation field provided herein, comprising: obtain the visualization letter of operation field Cease data;Analysis operation is determined according to the type of the visualized informative data, to described in visualized informative data execution Analysis operation, obtains behavioral data;Judge whether the behavioral data matches with act of violating regulations data;If so, being accused Alert operation.
By obtaining the visualized informative data of operation field, then further according to the type of visualized informative data, to can Analysis operation is carried out depending on changing information data, behavioral data is obtained, finally judges whether to operate against regulations according to behavioral data, when Occur carrying out alarm operation to operation field automatically when act of violating regulations, does not need full-time staff and operation field is monitored, have The reduction supervision cost of effect, also, act of violating regulations can be matched automatically by this method, it improves and act of violating regulations is alerted Efficiency.
The application also provides the warning system violating the regulations of operation field a kind of, operation field alarm device and computer-readable Storage medium has the above beneficial effect, and therefore not to repeat here.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the alarm method violating the regulations of the first operation field provided by the embodiment of the present application;
Fig. 2 is the flow chart of the alarm method violating the regulations of second of operation field provided by the embodiment of the present application;
Fig. 3 is the flow chart of the alarm method violating the regulations of the third operation field provided by the embodiment of the present application;
Fig. 4 is a kind of structural schematic diagram of the warning system violating the regulations of operation field provided by the embodiment of the present application.
Specific embodiment
The core of the application be to provide a kind of alarm method violating the regulations of operation field, operation field warning system violating the regulations, Operation field alarm device and computer readable storage medium, by analyzing the visualized informative data got, Behavioral data is obtained, then is judged accordingly, to carry out alarm operation, monitoring cost is reduced, improves the timeliness of monitoring.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
In the prior art, currently used method needs to put into a large amount of manpower and material resources, and higher cost causes very big money Source waste, and remote supervisory is carried out by Visualization Platform, the security risk of operating personnel can not be controlled at the first time, reduced To the effectiveness of operation field supervision.
Therefore, the application provides a kind of alarm method violating the regulations of operation field, and the visualization by obtaining operation field is believed Breath data carry out analysis operation to visualized informative data, obtain behavior number then further according to the type of visualized informative data According to finally judging whether to operate against regulations according to behavioral data, be accused automatically to operation field when there is act of violating regulations Alert operation, does not need full-time staff and is monitored to operation field, effectively reduces supervision cost, also, can by this method To match automatically to act of violating regulations, the efficiency alerted to act of violating regulations is improved.
Referring to FIG. 1, Fig. 1 is the process of the alarm method violating the regulations of the first operation field provided by the embodiment of the present application Figure.
In the present embodiment, this method may include:
S101 obtains the visualized informative data of operation field;
This step is intended to obtain the visualized informative data of operation field, and subsequent step is allowed to pass through visual information Data carry out operation supervision except operation field, rather than are exercised supervision by special messenger to staff in operation field, subtract The cost of labor of operation field supervision is lacked.
Further, visualized informative data can be the video monitoring data of the operation field obtained by camera, It is also possible to the monitoring photo of operation field, can also be the infrared monitoring video data of operation field.As it can be seen that in the present embodiment The form of the visualized informative data got is not unique, is not specifically limited herein.
S102, determines analysis operation according to the type of visualized informative data, executes analysis behaviour to visualized informative data Make, obtains behavioral data;
On the basis of S101, this step is intended to the type difference according to visualized informative data, can determine different Analysis operation, to execute suitable analysis operation to different types of visualized informative data.
Specifically, the distance of the stationary article in photo can be analyzed for the visualized informative data of photo type, It can also be regarded for infrared monitoring for the behavior act of human body in the visualized informative data analysis video of video type The distance between human body and heat source in the visualized informative data analysis video of frequency type.As it can be seen that for difference in this step Therefore, in this step the visualized informative data of type needs to be believed according to visualization first there are different analysis modes of operation The type for ceasing data determines analysis operation, then executes analysis operation to visualized informative data again, and then obtain corresponding Behavioral data.
And general is to be exercised supervision by supervisor to visualized informative data in the prior art, supervisor's root Judged according to experience, determines whether act of violating regulations occur.But since supervisor is based on experience judgement There are certain subjectivities, and the case where not can avoid subjective errors, and therefore, the success rate supervised by personnel is extremely low.Meanwhile There is also high costs of labor, cause the waste of related resource.
S103, judges whether behavioral data matches with act of violating regulations data;If so, executing S104;
On the basis of S102, this step be intended to behavioral data that discriminatory analysis obtains whether with act of violating regulations data phase Match.Based on previous step, may exist different analysis data for different visualized informative datas, therefore, in this step It needs to be determined how according to the content of analysis data and carries out judgement operation.
Further, act of violating regulations data are directed to different behavioral datas, usually there is different types of act of violating regulations number According to, including movement violating the regulations, distance of breaking rules and regulations, laying for goods mode violating the regulations etc., to cope with different behavioral datas.
S104 executes alarm operation.
On the basis of S103, this step is intended for alarm operation.Specifically, alarm can be executed according to preset path Operation.Wherein, preset path includes playing alert tones, flash for prompting light, to the mobile device or wearable device of staff Alarm pushing being sent, staff being alerted with will pass through mobile device or wearable device.
Optionally, the present embodiment can also include:
When behavioral data and act of violating regulations Data Matching, behavioral data is saved to act of violating regulations database.
As it can be seen that the behavioral data after matching can also be saved into act of violating regulations database by this optinal plan, with Continue when being judged after an action of the bowels, can also be judged according to the data in act of violating regulations database.
Further, it is also possible to deep learning is carried out to from the collected violation data of operation field, it can also be from other data The collected violation data in library carries out deep learning, by deep learning to identification model behavioral data is judged, mention Determination rate of accuracy of the height to act of violating regulations.
The present embodiment can be improved based on Snapshot System of Traffic Violation, be obtained by video when specifically being implemented The visualized informative data got judges whether act of violating regulations occur.Multiple acts of violating regulations can be preset using early period in system, Whether act of violating regulations can occur by judgment of learning automatically using the later period in system.
To sum up, the present embodiment passes through the visualized informative data for obtaining operation field, then further according to visual information number According to type, analysis operation is carried out to visualized informative data, behavioral data is obtained, finally judges whether according to behavioral data It now operates against regulations, alarm operation is carried out to operation field automatically when there is act of violating regulations, it is existing to operation not need full-time staff Field is monitored, and effectively reduces supervision cost, also, can match automatically to act of violating regulations by this method, is improved To the efficiency of act of violating regulations alarm.
Below by way of one embodiment, a kind of alarm method violating the regulations of operation field provided by the present application is done furtherly It is bright.
Referring to FIG. 2, Fig. 2 is the process of the alarm method violating the regulations of second of operation field provided by the embodiment of the present application Figure.
In the present embodiment, this method may include:
S201 obtains the visualized informative data of operation field;
S202 carries out human action to visualized informative data when the type of visualized informative data is video data Analysis, obtains human action information;Using human action information as behavioral data;
As it can be seen that mainly analysis operation is executed to the visualized informative data of video data in the present embodiment, to obtain Human action information.Wherein, human action information can be carrying movement, praise the action messages such as movement or walking motion.
Wherein, any one human action analysis side that the method for human action analysis can be provided using the prior art Method can also be not specifically limited herein using recognition methods such as deep neural network identifications.
S203, judge behavioral data human action information whether the human action information phase with act of violating regulations data Match;If so, executing S204;
On the basis of S202, this step is mainly that the human action information passed through in act of violating regulations data is judged, Namely discriminatory analysis to human action information and the human action information in act of violating regulations data it is whether identical.Specifically, There may be different differences for human action information in different operation fields in act of violating regulations data, can be according to operation The attribute at scene determines act of violating regulations data under the scene.
S204 carries out alarm operation.
Specific implementation process about above-mentioned steps S201 to S204 can refer to the content of previous embodiment, herein no longer into Row repeats.
Below by way of one embodiment, a kind of alarm method violating the regulations of operation field provided by the present application is done furtherly It is bright.
Referring to FIG. 3, Fig. 3 is the process of the alarm method violating the regulations of the third operation field provided by the embodiment of the present application Figure.
In the present embodiment, this method may include:
S301 obtains the visualized informative data of operation field;
S302 carries out safe distance to visualized informative data when the type of visualized informative data is picture data Analysis, obtains range data;Using range data as behavioral data;
As it can be seen that S302 is mainly to carry out static safe distance to picture data to analyze, that is, compare in the present embodiment Data in piece carry out static analysis, get in picture data human body to dangerous objects or the range data of danger zone.
Wherein, the method for carrying out safe distance analysis to picture data, can be and first identify position of human body, then identify The position of dangerous goods or danger zone, then calculate the distance between two.Wherein, carrying out knowledge method for distinguishing can be using existing Any one recognition methods for having technology to provide, this will not be repeated here.
S303, judges whether the range data of behavioral data is greater than the safe distance data of act of violating regulations data;If so, Execute S303;
On the basis of S302, this step is intended to whether the range data that discriminatory analysis obtains is greater than safe distance data, If so, indicating that situation violating the regulations occurs in position of human body at this time.Further, operating personnel can also be judged according to range data Whether working range is exceeded.
S304 carries out alarm operation.
Specific implementation process about above-mentioned steps S301 to S304 can refer to the content of previous embodiment, herein no longer into Row repeats.
A kind of warning system violating the regulations of operation field provided by the embodiments of the present application is introduced below, it is described below A kind of warning system violating the regulations of operation field can correspond to each other ginseng with a kind of above-described alarm method violating the regulations of operation field According to.
Referring to FIG. 4, Fig. 4 shows for a kind of structure of the warning system violating the regulations of operation field provided by the embodiment of the present application It is intended to.
In the present embodiment, which may include:
Visualized informative data obtains module 100, for obtaining the visualized informative data of operation field;
Visual information analysis module 200, for determining analysis operation according to the type of visualized informative data, to visual Change information data and execute analysis operation, obtains behavioral data;
Judgment module 300 violating the regulations, for judging whether behavioral data matches with act of violating regulations data;
Alarm module 400 violating the regulations, for carrying out alarm operation when behavioral data and act of violating regulations Data Matching.
Optionally, which can also include:
Violation data preserving module, for when behavioral data and when act of violating regulations Data Matching, by behavioral data save to Act of violating regulations database.
The embodiment of the present application also provides a kind of field operation alarm device, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as alarm method violating the regulations of above embodiments.
The embodiment of the present application also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, when computer program is executed by processor the step of the realization such as alarm method violating the regulations of above embodiments.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above to the alarm system violating the regulations of a kind of alarm method violating the regulations of operation field provided herein, operation field System, operation field alarm device and computer readable storage medium are described in detail.Specific case used herein The principle and implementation of this application are described, the side for the application that the above embodiments are only used to help understand Method and its core concept.It should be pointed out that for those skilled in the art, not departing from the application principle Under the premise of, can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the claim of this application In protection scope.

Claims (10)

1. a kind of alarm method violating the regulations of operation field characterized by comprising
Obtain the visualized informative data of operation field;
Analysis operation is determined according to the type of the visualized informative data, and the analysis is executed to the visualized informative data Operation, obtains behavioral data;
Judge whether the behavioral data matches with act of violating regulations data;
If so, carrying out alarm operation.
2. alarm method violating the regulations according to claim 1, which is characterized in that according to the type of the visualized informative data It determines analysis operation, the analysis is executed to the visualized informative data and is operated, behavioral data is obtained, comprising:
When the type of the visualized informative data is video data, human action point is carried out to the visualized informative data Analysis, obtains human action information;
Using the human action information as the behavioral data.
3. alarm method violating the regulations according to claim 2, which is characterized in that judge the behavioral data whether with row violating the regulations Match for data, comprising:
Judge whether the human action information of the behavioral data matches with the human action information of the act of violating regulations data.
4. alarm method violating the regulations according to claim 1, which is characterized in that according to the type of the visualized informative data It determines analysis operation, the analysis is executed to the visualized informative data and is operated, behavioral data is obtained, comprising:
When the type of the visualized informative data is picture data, safe distance point is carried out to the visualized informative data Analysis, obtains range data;
Using the range data as the behavioral data.
5. alarm method violating the regulations according to claim 4, which is characterized in that judge the behavioral data whether with row violating the regulations Match for data, comprising:
Judge whether the range data of the behavioral data is greater than the safe distance data of the act of violating regulations data.
6. alarm method violating the regulations according to claim 1, which is characterized in that further include:
When the behavioral data and the act of violating regulations Data Matching, the behavioral data is saved to act of violating regulations data Library.
7. a kind of warning system violating the regulations of operation field characterized by comprising
Visualized informative data obtains module, for obtaining the visualized informative data of operation field;
Visual information analysis module, for according to the type of the visualized informative data determine analysis operation, to it is described can The analysis operation is executed depending on changing information data, obtains behavioral data;
Judgment module violating the regulations, for judging whether the behavioral data matches with act of violating regulations data;
Alarm module violating the regulations, for carrying out alarm operation when the behavioral data and the act of violating regulations Data Matching.
8. alarm device violating the regulations according to claim 7, which is characterized in that further include:
Violation data preserving module is used for when the behavioral data and the act of violating regulations Data Matching, by the behavior number According to preservation to act of violating regulations database.
9. a kind of operation field alarm device characterized by comprising
Memory, for storing computer program;
Processor realizes such as alarm method violating the regulations as claimed in any one of claims 1 to 6 when for executing the computer program The step of.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized when the computer program is executed by processor such as alarm method violating the regulations as claimed in any one of claims 1 to 6 Step.
CN201910491479.6A 2019-06-06 2019-06-06 A kind of alarm method and relevant apparatus violating the regulations of operation field Pending CN110188731A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910491479.6A CN110188731A (en) 2019-06-06 2019-06-06 A kind of alarm method and relevant apparatus violating the regulations of operation field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910491479.6A CN110188731A (en) 2019-06-06 2019-06-06 A kind of alarm method and relevant apparatus violating the regulations of operation field

Publications (1)

Publication Number Publication Date
CN110188731A true CN110188731A (en) 2019-08-30

Family

ID=67720754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910491479.6A Pending CN110188731A (en) 2019-06-06 2019-06-06 A kind of alarm method and relevant apparatus violating the regulations of operation field

Country Status (1)

Country Link
CN (1) CN110188731A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909675A (en) * 2019-11-22 2020-03-24 广州供电局有限公司 Method and device for identifying violation behaviors, computer equipment and storage medium
CN111652185A (en) * 2020-06-23 2020-09-11 广东电网有限责任公司河源供电局 Safety construction method, system, device and storage medium based on violation behavior recognition
CN112419665A (en) * 2020-11-18 2021-02-26 上海电机学院 Human near-water safety monitoring and alarming method based on target detection

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103854233A (en) * 2014-02-27 2014-06-11 北京优孚特科技有限公司 Electric power security control recognition device and method
CN104092923A (en) * 2014-07-21 2014-10-08 国家电网公司 Intelligent Video Ranging Method for Transmission Lines
CN104994346A (en) * 2015-07-06 2015-10-21 重庆昊广重工机械有限公司 Intelligent construction safety management monitoring system and image alarm processing method thereof
CN105989682A (en) * 2015-02-05 2016-10-05 国家电网公司 Safety early warning and monitoring system and monitoring method for construction machinery under power transmission line
CN106204998A (en) * 2016-08-03 2016-12-07 湖州智讯信息科技有限公司 A kind of industrial safety based on Intelligent hot imaging monitoring system
CN107633210A (en) * 2017-08-28 2018-01-26 上海欧忆能源科技有限公司 Building site ascend a height monitoring system, method, apparatus, medium and equipment violating the regulations
CN107658788A (en) * 2017-11-13 2018-02-02 国网上海市电力公司 Power circuit live-working safety is apart from real-time watch device
CN109145789A (en) * 2018-08-09 2019-01-04 炜呈智能电力科技(杭州)有限公司 Power supply system safety work support method and system
CN110119656A (en) * 2018-02-07 2019-08-13 中国石油化工股份有限公司 Intelligent monitor system and the scene monitoring method violating the regulations of operation field personnel violating the regulations

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103854233A (en) * 2014-02-27 2014-06-11 北京优孚特科技有限公司 Electric power security control recognition device and method
CN104092923A (en) * 2014-07-21 2014-10-08 国家电网公司 Intelligent Video Ranging Method for Transmission Lines
CN105989682A (en) * 2015-02-05 2016-10-05 国家电网公司 Safety early warning and monitoring system and monitoring method for construction machinery under power transmission line
CN104994346A (en) * 2015-07-06 2015-10-21 重庆昊广重工机械有限公司 Intelligent construction safety management monitoring system and image alarm processing method thereof
CN106204998A (en) * 2016-08-03 2016-12-07 湖州智讯信息科技有限公司 A kind of industrial safety based on Intelligent hot imaging monitoring system
CN107633210A (en) * 2017-08-28 2018-01-26 上海欧忆能源科技有限公司 Building site ascend a height monitoring system, method, apparatus, medium and equipment violating the regulations
CN107658788A (en) * 2017-11-13 2018-02-02 国网上海市电力公司 Power circuit live-working safety is apart from real-time watch device
CN110119656A (en) * 2018-02-07 2019-08-13 中国石油化工股份有限公司 Intelligent monitor system and the scene monitoring method violating the regulations of operation field personnel violating the regulations
CN109145789A (en) * 2018-08-09 2019-01-04 炜呈智能电力科技(杭州)有限公司 Power supply system safety work support method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909675A (en) * 2019-11-22 2020-03-24 广州供电局有限公司 Method and device for identifying violation behaviors, computer equipment and storage medium
CN111652185A (en) * 2020-06-23 2020-09-11 广东电网有限责任公司河源供电局 Safety construction method, system, device and storage medium based on violation behavior recognition
CN112419665A (en) * 2020-11-18 2021-02-26 上海电机学院 Human near-water safety monitoring and alarming method based on target detection

Similar Documents

Publication Publication Date Title
CN211741994U (en) Identification monitoring device for safety risk of power grid field operation
CN110188731A (en) A kind of alarm method and relevant apparatus violating the regulations of operation field
CN111144232A (en) Transformer substation electronic fence monitoring method based on intelligent video monitoring, storage medium and equipment
CN106936781B (en) A kind of determination method and device of user's operation behavior
CN114003771A (en) Special operation field abnormity early warning analysis system and method based on Internet of things
CN113673459B (en) Video-based production and construction site safety inspection method, system and equipment
CN113627897B (en) Method and device for controlling safety of field operators and storage medium
CN110379125A (en) Cross the border recognition methods, system and relevant apparatus for a kind of danger zone
CN118053261B (en) Anti-spoofing early warning method, device, equipment and medium for smart campus
CN114092875B (en) Machine learning-based operation site safety supervision method and device
CN113205238A (en) Situation awareness defense capacity assessment method for power plant industrial control system
CN112968796A (en) Network security situation awareness method and device and computer equipment
CN109687999A (en) A kind of association analysis method of alarm failure, device and equipment
CN105095523A (en) Alarm event handling method and system
CN105825130A (en) Information security early-warning method and device
CN114240013A (en) Key information infrastructure-oriented defense command method and system
CN114462828A (en) Safety early warning supervision system for engineering construction and supervision method thereof
CN114422327A (en) Alarm handling suggestion generation method, device and system and computer readable storage medium
CN118506446A (en) Distribution network engineering worker illegal behavior identification method, system and medium
CN110286609B (en) Obstacle avoidance control method and device for intelligent safety helmet
CN112751927A (en) Network safety monitoring system applied to electric power monitoring system
CN112906552A (en) Inspection method and device based on computer vision and electronic equipment
CN116978180A (en) Environment safety detection method and device for steel mill, medium and electronic equipment
CN116580514A (en) Intelligent security method, system, medium and electronic equipment based on Internet of things
CN112560658B (en) Early warning method, early warning device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190830

RJ01 Rejection of invention patent application after publication